[go: up one dir, main page]

skip to main content
10.1145/2295136.2295154acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Optimal workflow-aware authorizations

Published: 20 June 2012 Publication History

Abstract

Balancing protection and empowerment is a central problem when specifying authorizations. The principle of least privilege, the classical approach to balancing these two conflicting objectives, says that users shall only be authorized to execute the tasks necessary to complete their job. However, when there are multiple authorization policies satisfying least privilege, which one should be chosen?
In this paper, we model the tasks that users must execute as workflows, and the risk and cost associated with authorization policies and their administration. We then formulate the balancing of empowerment and protection as an optimization problem: finding a cost-minimizing authorization policy that allows a successful workflow execution. We show that finding an optimal solution for a role-based cost function is NP-complete. We support our results with a series of examples, which we also use to measure the performance of our prototype implementation.

References

[1]
V. Atluri, E. Bertino, E. Ferrari, and P. Mazzoleni. Supporting delegation in secure workflow management systems. In Proc. of the Annual Working Conference on Data and Application Security, pp. 190--202, 2003.
[2]
B. Aziz, S. N. Foley, J. Herbert, and G. Swart. Reconfiguring role based access control policies using risk semantics. J. High Speed Networks, 15(3):261--273, 2006.
[3]
D. Basin, S. J. Burri, and G. Karjoth. Obstruction-free authorization enforcement: Aligning security with business objectives. In Proc. of the IEEE Computer Security Foundations Symposium (CSF '11), pp. 99--113 2011.
[4]
D. Basin, S. J. Burri, and G. Karjoth. Optimal Workflow-aware Authorizations, IBM Research, RZ 3815, 2012.
[5]
D. Basin, P. Schaller, and M. Schläpfer. Applied Information Security. Springer, 2011.
[6]
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations, MTR-2547, The Mitre Corporation, 1973.
[7]
G. Chartrand and P. Zhang. Chromatic Graph Theory. Chapman & Hall, 2008.
[8]
P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In Proc. of the IEEE Symposium on Security and Privacy (S&P '07), pp. 222--230, 2007.
[9]
J. Crampton. A reference monitor for workflow systems with constrained task execution. In Proc. of the ACM Symposium on Access Control Models and Technologies (SACMAT '05), pp. 38--47, 2005.
[10]
J. Crampton and H. Khambhammettu. Delegation and satisfiability in workflow systems. In Proc. of the ACM Symposium on Access Control Models and Technologies (SACMAT '08), pp. 31--40, 2008.
[11]
European Union. Final report of the expert group on e-invoicing. http://bit.ly/yvWtfQ, 2009.
[12]
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for Role-Based Access Control. TISSEC, 4(3):224--274, 2001.
[13]
V. D. Gligor, S. I. Gavrila, and D. Ferraiolo. On the formal definition of separation-of-duty policies and their composition. Proc. of the the IEEE Symposium on Security and Privacy (S&P '98), pp. 172--183, 1998.
[14]
W. Han, Q. Ni, and H. Chen. Apply measurable risk to strengthen security of a role-based delegation supporting workflow system. In Proc. of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY '09), pp. 45--52, 2009.
[15]
IBM. WebSphere Process Server (WPS), v 6.2, 2011.
[16]
IT Governance Institute. Control objectives for information and related technology (COBIT) 4.1, 2005.
[17]
I. Molloy, P.-C. Cheng, and P. Rohatgi. Trading in risk: using markets to improve access control. In Proc. of the Workshop on New Security Paradigms (NSPW '08), pp. 107--125, 2008.
[18]
M. C. Mont, Y. Beresnevichiene, D. Pym, and S. Shiu. Economics of identity and access management: Providing decision support for investments. In Network Operations and Mgnt. Symposium Workshops, pp. 134--141, 2010.
[19]
Object Management Group (OMG). Business Process Model and Notation (BPMN), v 2.0. 2011.
[20]
J. Saltzer and M. Schroeder. Theprotection of information in computer systems. Proc. of the IEEE, pp. 1278--1308, 1975
[21]
A. Schrijver. Theory of Linear and Integer Programming. Wiley, 1998.
[22]
The MathWorks. Matlab r2011b. 2012.
[23]
W. M. P. van der Aalst, A. H. M. ter Hofstede, B. Kiepuszewski, and A. P. Barros. Workflow patterns. Distributed and Parallel Databases, 14(1):5--51, 2003.
[24]
J. Wainer, A. Kumar, and P. Barthelmess. DW-RBAC: A formal security model of delegation and revocation in workflow systems. Inf. Syst., 32(3):365--384, 2007.
[25]
Q. Wang and N. Li. Satisfiability and resiliency in workflow authorization systems. TISSEC, 13(4):40, 2010.
[26]
L. Zhang, A. Brodsky, and S. Jajodia. Toward information sharing: Benefit and risk access control (BARAC). In Proc. of the IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY '06), pp. 45--53, 2006.

Cited By

View all
  • (2022)Valued Authorization Policy Existence Problem: Theory and ExperimentsACM Transactions on Privacy and Security10.1145/352810125:4(1-32)Online publication date: 9-Jul-2022
  • (2021)A Workflow Criticality-Based Approach to Bypass the Workflow Satisfiability ProblemSecurity and Communication Networks10.1155/2021/33309232021Online publication date: 1-Jan-2021
  • (2021)Enabling Workforce Optimization in Constrained Attribute-Based Access Control SystemsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2019.29447879:4(1901-1913)Online publication date: 1-Oct-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '12: Proceedings of the 17th ACM symposium on Access Control Models and Technologies
June 2012
242 pages
ISBN:9781450312950
DOI:10.1145/2295136
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authorizations
  2. complexity
  3. optimality
  4. workflows

Qualifiers

  • Research-article

Conference

SACMAT '12
Sponsor:

Acceptance Rates

SACMAT '12 Paper Acceptance Rate 19 of 73 submissions, 26%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Valued Authorization Policy Existence Problem: Theory and ExperimentsACM Transactions on Privacy and Security10.1145/352810125:4(1-32)Online publication date: 9-Jul-2022
  • (2021)A Workflow Criticality-Based Approach to Bypass the Workflow Satisfiability ProblemSecurity and Communication Networks10.1155/2021/33309232021Online publication date: 1-Jan-2021
  • (2021)Enabling Workforce Optimization in Constrained Attribute-Based Access Control SystemsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2019.29447879:4(1901-1913)Online publication date: 1-Oct-2021
  • (2020)Stochastic Workflow Authorizations with Queueing ConstraintsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3026296(1-1)Online publication date: 2020
  • (2019)Verifying for Compliance to Data Constraints in Collaborative Business ProcessesCollaborative Networks and Digital Transformation10.1007/978-3-030-28464-0_23(259-270)Online publication date: 15-Aug-2019
  • (2019)Securing Emergent IoT ApplicationsChallenging the Borders of Justice in the Age of Migrations10.1007/978-3-030-17601-3_3(99-147)Online publication date: 14-Apr-2019
  • (2018)Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories TechniquesProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies10.1145/3205977.3205982(117-128)Online publication date: 7-Jun-2018
  • (2018)Workflow-Aware Security of Integrated Mobility ServicesComputer Security10.1007/978-3-319-98989-1_1(3-19)Online publication date: 7-Aug-2018
  • (2017)Automatically finding execution scenarios to deploy security-sensitive workflowsJournal of Computer Security10.3233/JCS-1689425:3(255-282)Online publication date: 29-May-2017
  • (2017)The bi-objective workflow satisfiability problem and workflow resiliency1Journal of Computer Security10.3233/JCS-1684925:1(83-115)Online publication date: 16-Mar-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media